<aside> ⚠️
CLICK DUPLICATE BUTTON TO START USING THE TEMPLATE
</aside>
<aside> 🎯
Objective: Evaluate your organization's resilience against supply chain attacks by simulating how attackers can compromise trusted third-party relationships to bypass your security controls and gain access to systems and data.
</aside>
Select the most appropriate attack vectors based on your organization's vendor ecosystem:
| Attack Vector | Complexity | Detection Difficulty | Impact Potential | Best For |
|---|---|---|---|---|
| Vendor Account Compromise | Medium | High | Very High | Testing vendor access controls |
| Software Dependency Attack | High | Very High | Critical | Testing software delivery pipeline |
| Update Infrastructure Compromise | High | High | Critical | Testing patch management process |
| Third-Party API/Service Attack | Medium | Medium | High | Testing integrated services |
| Vendor Network Compromise | High | Medium | High | Testing network trust relationships |
| Hardware/Firmware Supply Chain | Very High | Very High | Critical | Advanced security programs |
| Target Type | Risk Level | Value for Assessment | Selection Criteria |
|---|---|---|---|
| Critical Vendors | High | Very High | Vendors with admin access or critical data access |
| SaaS Providers | Medium-High | High | Cloud services with sensitive data or wide access |
| Software Providers | Medium | High | Applications used in critical business processes |
| Development Dependencies | Medium | Medium-High | Libraries, frameworks used in internal applications |
| Managed Service Providers | High | Very High | Providers with privileged network/system access |
| Hardware/Device Vendors | Medium | Medium | Device firmware, IoT, or specialized hardware |
| Boundary Type | Description | Example Constraints |
|---|---|---|
| Simulation Boundaries | Which attacks to simulate vs. emulate | No actual vendor compromise, simulate with authorized access |
| Target Boundaries | Which vendors/services in scope | Only top 5 critical vendors by risk assessment |
| Technical Boundaries | Technical limits on testing | No destruction of data, no actual malware deployment |
| Notification Boundaries | Who is aware of the exercise | Notify security team but not vendor management team |
| Time Boundaries | When testing can occur | Business hours only, specific testing window |